Researchers are urging Android app developers who use in-app advertising tools from ad network AppLovin to update their apps and protect end users from serious security risks in the company’s ad library.
The recent release of Apple’s iOS 7 mobile operating system led to a flood of Internet traffic that has slowed parts of the Internet and registered as a seismic event in post-launch analytics, security vendor Blue Coat Systems has reported.
Growing demand for managed security services to help keep up with the increasing demand on security infrastructure posed by bring your own device (BYOD) programs, the local head of security firm Barracuda Networks has observed.
BlackBerry has suspended the roll out of its messaging service BBM for iOS and Android after an unofficial Android version was leaked ahead of the scheduled release.
Organisations adopting bring your own device (BYOD) policies and cloud-computing apps should introduce passive scanning of mobile device traffic to identify malware rather than trying to actively scan the devices, a security architect has advised.
With the rise of mobile computing -- first via laptops, then smartphones and now tablets -- the IT landscape changed within the enterprise. No more was IT just about the local network, WANs and security for desktops and servers: it now had to incorporate mobile devices, spanning all manner of manufacturers, operating systems, and platforms and to do so without compromising security. The sheer volume of devices and the different software they run is a natural antithesis to network security. Yet, these devices are integral to the way business works today, and so the IT department must adapt.
Bring your own device (BYOD) will continue to shift the way employees interact with enterprise applications and information, which raises considerable security challenges to any organisation. We already know that these devices include tablets, including iOS and Android smartphones, “Wintel” laptops, but there are many devices we are yet to see.
Now that employees increasingly expect the workplace to provide secured any time, anywhere connection – whether over 2G or 3G networks or Wi-Fi, for both personal and business tasks – it’s clear that IT management has lost its mandate on the choice of smartphone and tablet access in the corporate setting.
There have been profound changes in recent years in the way that people work. Mobility, virtualisation and globalisation have extensively altered how business is conducted. These changes mean that updated and upgraded security systems are needed to ensure data security.
The head of security hastily leaves the meeting without excusing herself. Her body language indicates that it is an important call. As she walks back in, all eyes in the room subliminally pose the same question. Without further prompting, the head of security says: “The CEO wants to know why she can’t watch a YouTube video on her iPad. It’s against policy, but we have to make it happen. While we’re at it, she also wants to be able to access her email and calendar on her iPhone”. This actually happened at a large financial institution.
Sign up now »
Get powerful mobile security capabilities, and protect the data the various mobile devices inside your organization.
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.